BYOD Policies Lack Adequate Security

Posted by Heidi Schwartz

Webroot has published a new BYOD Security Report which uncovers the disparities between IT policies and practices and the employee’s concerns and preferences related to Bring Your Own Device (BYOD) and provides suggestions and best practices to reduce the risk to corporate data from employee-owned mobile devices. This report is based on research which examines the use and security of personal mobile devices in the work environment from both the employee and employer perspectives.

The initial survey, conducted in late 2013, explored the prevalence of employee-owned devices, how they are being secured, and employee concerns regarding company-mandated security programs. The second survey, conducted in March 2014, looked at how IT managers view the risk of employee-owned devices, the prevalence of formal mobile security policies, and the extent to which employee input is included in developing BYOD policies.

Key findings from the Webroot BYOD Security Report include:

Although 98% of employers have a security policy in place for mobile access to corporate data, 21% allow employee access with no security at all.

Over 60% of IT managers surveyed reported the use of personal devices by their employees and 58% indicated they were “very” or “extremely” concerned about the security risk from this practice.

Most employee devices are lacking real security with only 19% installing a full security app and 64% of employees limited to using only the security features that came with their devices.

Over 60% of employers indicated they seek employee input on mobile device security policies, but over 60% also said employee preference has little or no influence on mobile security decisions.

Top concerns from employees regarding a company-mandated security app include employer access to personal data, personal data being wiped by an employer, and employers tracking the location of the device. Other concerns included impact on device performance and battery consumption.

46% of employees using personal devices said they would stop using their devices for business purposes if their employer mandated installation of a specific security app.

The new “Fixing the Disconnect between Employer and Employee for BYOD” report, based on data collected by Harris Interactive, features perspectives from more than 2,000 working professionals and more than 205 full-time IT professionals in the U.S. who have a major influence on mobile device security decisions. It concluded that while there are many areas of agreement, there are also some striking signs that many employers and employees do not take adequate steps to protect company information, a weakness that could result in critical security breakdowns. There is also evidence that employers may not be working collaboratively enough with employees in deciding how to manage BYOD security. This can create problems given the large number of personal devices being used for work purposes.

“Traditionally, employers could dictate the type of security used on each device, because all devices were company-issued and IT could fully manage them,” said Mike Malloy, executive vice president of products and strategy at Webroot. “Today, with so many personal smartphones, tablets, and laptops now being used to access corporate data, the productivity gains and cost savings for employers are substantial, but IT security policy makers have to think differently and work more collaboratively with their users to determine security policies and practices that address the concerns of both parties.”

Bridging the Gap: Where do employers go from here?

From the results of the employee and employer research surveys, it appears that most disconnects over the use of personal technology to access corporate data can be solved by better communication between both parties over their security, data, and privacy concerns.

When it comes to BYOD policies, Webroot recommends:

Employees must have mobile device security, and employers need to ensure they install adequate protection and require features like password access are always turned on.

Investing in educating employees about the risks associated with mobile devices and the benefits of securing devices. An informed user is more likely to buy into BYOD security requirements.

It’s great to have policies, but they only work and are respected if they are enforced.

Simplify management—letting employees choose different security is time consuming.

“We believe if employee concerns about personal privacy are not addressed, or a security app that slows the device or drains the battery is forced upon employees, many will simply stop using their personal devices for work,” said Malloy. “These concerns definitely influenced the way we designed Webroot Mobile Security for businesses.”

Featured Video

Powered by highly advanced encryption and a software-based infrastructure, Seos secures trusted identities on any form factor and can be extended for applications beyond physical access control. Learn more at hidglobal.com/seos.

The company will expand its Nashville area operations for the second time in two years, creating 2,010 new jobs in the process. - Read: SmileDirectClub Investing $217M To Expand Middle Tennessee HQ at BusinessFacilities.com.

Employees have been offered a position when they were underqualified most frequently in Charlotte, San Diego, Austin and Washington, DC, according to a new Robert Half survey. - Read: Companies Willing To Train Job Applicants Who Don’t Meet Requirements at BusinessFacilities.com.

Knowledge Channels

Join 25,000+ Subscribers & Get the latest from Facility Executive!

Facility Executive is your one-stop source for information on quality operation, design and maintenance of facilities. Facility Executive offers a shared community of facility management experts who explore and analyze issues that affect your facility and its environment.

Facility Executive is a specialized trade publication written and edited for corporate facility executives in all industry and service sectors whose responsibilities include purchasing, planning and approving products, services and materials for facility operations.